Vulnerability scanner and data gatherer for the Concrete5 CMS or C5Scan. Is somewhat outdated by and by pending a refactor.
Concrete5 is an open-source content management system (CMS) for distributing content on the World Wide Web and intranets. concrete5 includes in-context altering. Editable zones are characterized in concrete5 layouts which enable editors to embed blocks of content. These can contain basic substance like text and pictures or have more intricate usefulness.
$ python c5scan.py -u localhost -r
**********************************************************
* ~ C5scan ~ *
* A vulnerability and information gatherer for concrete5 *
* auraltension@riseup.net *
**********************************************************
No http:// or https:// provided. Trying http://
URL: http://localhost/
[+] Discovered version 5.6.2.1 from meta 'generator' tag
[+] Interesting header: server: Apache/2.2.14 (Ubuntu)
[+] Interesting header: x-powered-by: PHP/5.3.2-1ubuntu4.24
[+] robots.txt found at http://localhost/robots.txt
User-agent: *
Disallow: /blocks
Disallow: /concrete
Disallow: /config
Disallow: /controllers
Disallow: /css
Disallow: /elements
Disallow: /helpers
Disallow: /jobs
Disallow: /js
Disallow: /languages
Disallow: /libraries
Disallow: /mail
Disallow: /models
Disallow: /packages
Disallow: /single_pages
Disallow: /themes
Disallow: /tools
Disallow: /updates
Enumerating updates in /updates/
[+] Update version 5.5.2.1 exists
[+] Update version 5.6.2.1 exists
Looking for Readme files
[+] Found a readme at: http://localhost/concrete/libraries/3rdparty/adodb/readme.txt
[+] Found a readme at: http://localhost/concrete/libraries/3rdparty/adodb/docs/docs-adodb.htm
[+] Found a readme at: http://localhost/concrete/blocks/video/README
[+] Found a readme at: http://localhost/concrete/libraries/3rdparty/StandardAnalyzer/Readme.txt
[+] Found a readme at: http://localhost/concrete/libraries/3rdparty/securimage/README.txt
Checking for known vulnerabilities in updates
[+] A known vulnerability exists for 5.6.2.1:
SQL Injection in index.php cID param
http://www.exploit-db.com/exploits/31735/
Checking for known vulnerabilities in current version
[+] A known vulnerability exists for 5.6.2.1:
SQL Injection in index.php cID param
http://www.exploit-db.com/exploits/31735/
Finished.
Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…
This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…
The free and open-source security platform SecHub, provides a central API to test software with…
Don't worry if there are any bugs in the tool, we will try to fix…